Няма описание

AloneLiberty 3a1bd745e6 1.4.5 - Fix .nested folder if running Hard Nested преди 2 години
assets 0c13737038 1.0.0 - Public release преди 2 години
lib 7548828ec5 1.4.2 - Minor code refactor преди 2 години
scenes 7548828ec5 1.4.2 - Minor code refactor преди 2 години
LICENSE.md 0c13737038 1.0.0 - Public release преди 2 години
README.md af164faa8b 1.2.0 - Hard Nested attack преди 2 години
TODO.md af164faa8b 1.2.0 - Hard Nested attack преди 2 години
application.fam 3650991342 1.4.0 - Huge update преди 2 години
mifare_nested.c 3650991342 1.4.0 - Huge update преди 2 години
mifare_nested.h 0c13737038 1.0.0 - Public release преди 2 години
mifare_nested_i.h 3a1bd745e6 1.4.5 - Fix .nested folder if running Hard Nested преди 2 години
mifare_nested_worker.c 3a1bd745e6 1.4.5 - Fix .nested folder if running Hard Nested преди 2 години
mifare_nested_worker.h 3650991342 1.4.0 - Huge update преди 2 години
mifare_nested_worker_i.h 3650991342 1.4.0 - Huge update преди 2 години

README.md

Mifare Nested Attacks for Flipper Zero

Ported nested attacks from proxmark3 (Iceman fork)

Download

FlipC.org

Currently supported attacks

  • nested attack
  • static nested attack
  • hard nested attack

Warning

App is still in early development, so there may be bugs. Your Flipper Zero may randomly crash/froze. Please create issue if you find any bugs (one bug = one issue).

Disclaimer

The app provided for personal use only. Developer does not take responsibility for any loss or damage caused by the misuse of this app. In addition, the app developer does not guarantee the performance or compatibility of the app with all tags, and cannot be held liable for any damage caused to your tags/Flipper Zero as a result of using the app. By using this app you confirm that the tag belongs to you, you have permission to preform the attack and you agree to hold the app developer harmless from any and all claims, damages, or losses that may arise from its use.

I need your help!

To successfuly recover keys from nested attack we need to correctly predict PRNG value. But we have a problem with that. Due to lack of my knowlege of Flipper Zero NFC HAL, PRNG can jump by quite large values (not like Proxmark3). So app is trying to find a delay where PRNG can be predicted accurately enough. This is not the best option, because we have to try to recover a bunch of unnecessary keys, which takes a lot of time and RAM and also spend a lot of time on timings. I don't know how to fix it.

UPD: Chameleon Ultra devs faced same issue. They seems to use same method: nested.c (better know from the beginning of development...)

How to use it?

Detailed guide: EN, RU.

FAQ

For frequently asked questions, please refer to the FAQ: EN, RU.

Contacts

Telegram: @libertydev